Skip to main content

2024 | OriginalPaper | Buchkapitel

AI-Empowered Blockchain Techniques Against Cybersecurity Context in IoT: A Survey

verfasst von : Anandakumar Haldorai, Babitha Lincy R, Suriya Murugan, Minu Balakrishnan

Erschienen in: Artificial Intelligence for Sustainable Development

Verlag: Springer Nature Switzerland

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The Internet of Things (IoT) is a vast network made up of connected-internet items that use software’s installed to exchange data. Numerous Internet of Things (IoT) solutions have been created over the past 20 years by small, medium-sized, and major businesses to improve our quality of life. The need for more robust cybersecurity safeguards is becoming more critical as technology develops. Despite the fact that they are both different in nature and have the capacity to provide a variety of threat detection techniques, artificial intelligence and blockchain can work together or even stand alone to significantly improve cybersecurity. The latest attack vectors must be thwarted in this era of digitization, making cybersecurity crucial. Small enterprises, major corporations, and even individuals are all targets of cyberattacks. Cybercriminals are always developing new exploits to take advantage of vulnerabilities as the threat landscape evolves. Artificial Intelligence can be used to analyze enormous volumes of information or data to spot patterns and abnormalities that can be used to detect and thwart cyberattacks. Additionally, it can automate repetitive processes, freeing up human specialists to concentrate on trickier security problems. In this article, it examines how blockchain technology and artificial intelligence (AI) are transforming the internet of things (IoT) from cybersecurity. Some challenges and unresolved issues are mentioned in order to guide future research and stimulate more investigation of this subject that is becoming more and more relevant. This study elaborates on important future prospects that could be investigated by scholars to push this discipline even further.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
2.
5.
Zurück zum Zitat S. Aldhaheri, D. Alghazzawi, L. Cheng, A. Barnawi, and B. A. Alzahrani, “Artificial Immune Systems approaches to secure the internet of things: A systematic review of the literature and recommendations for future research,” Journal of Network and Computer Applications, vol. 157, p. 102537, May 2020, https://doi.org/10.1016/j.jnca.2020.102537. S. Aldhaheri, D. Alghazzawi, L. Cheng, A. Barnawi, and B. A. Alzahrani, “Artificial Immune Systems approaches to secure the internet of things: A systematic review of the literature and recommendations for future research,” Journal of Network and Computer Applications, vol. 157, p. 102537, May 2020, https://​doi.​org/​10.​1016/​j.​jnca.​2020.​102537.
6.
13.
15.
Zurück zum Zitat K. R. Ozyilmaz and A. Yurdakul, “Designing a Blockchain-Based IoT With Ethereum, Swarm, and LoRa: The Software Solution to Create High Availability With Minimal Security Risks,” IEEE Consumer Electronics Magazine, vol. 8, no. 2, pp. 28–34, Mar. 2019, https://doi.org/10.1109/mce.2018.2880806. K. R. Ozyilmaz and A. Yurdakul, “Designing a Blockchain-Based IoT With Ethereum, Swarm, and LoRa: The Software Solution to Create High Availability With Minimal Security Risks,” IEEE Consumer Electronics Magazine, vol. 8, no. 2, pp. 28–34, Mar. 2019, https://​doi.​org/​10.​1109/​mce.​2018.​2880806.
22.
25.
Zurück zum Zitat A. Haldorai, J. Sivaraj, M. Nagabushanam, and M. Kingston Roberts, “Cognitive Wireless Networks Based Spectrum Sensing Strategies: A Comparative Analysis,” Applied Computational Intelligence and Soft Computing, vol. 2022, pp. 1–14, Oct. 2022, https://doi.org/10.1155/2022/6988847.CrossRef A. Haldorai, J. Sivaraj, M. Nagabushanam, and M. Kingston Roberts, “Cognitive Wireless Networks Based Spectrum Sensing Strategies: A Comparative Analysis,” Applied Computational Intelligence and Soft Computing, vol. 2022, pp. 1–14, Oct. 2022, https://​doi.​org/​10.​1155/​2022/​6988847.CrossRef
27.
Zurück zum Zitat G. Spathoulas, N. Giachoudis, G.-P. Damiris, and G. Theodoridis, “Collaborative Blockchain-Based Detection of Distributed Denial of Service Attacks Based on Internet of Things Botnets,” Future Internet, vol. 11, no. 11, p. 226, Oct. 2019, https://doi.org/10.3390/fi11110226. G. Spathoulas, N. Giachoudis, G.-P. Damiris, and G. Theodoridis, “Collaborative Blockchain-Based Detection of Distributed Denial of Service Attacks Based on Internet of Things Botnets,” Future Internet, vol. 11, no. 11, p. 226, Oct. 2019, https://​doi.​org/​10.​3390/​fi11110226.
29.
Zurück zum Zitat M. A. Cheema, H. Khaliq Qureshi, C. Chrysostomou, and M. Lestas, “Utilizing Blockchain for Distributed Machine Learning based Intrusion Detection in Internet of Things,” 2020 16th International Conference on Distributed Computing in Sensor Systems (DCOSS), May 2020, https://doi.org/10.1109/dcoss49796.2020.00074. M. A. Cheema, H. Khaliq Qureshi, C. Chrysostomou, and M. Lestas, “Utilizing Blockchain for Distributed Machine Learning based Intrusion Detection in Internet of Things,” 2020 16th International Conference on Distributed Computing in Sensor Systems (DCOSS), May 2020, https://​doi.​org/​10.​1109/​dcoss49796.​2020.​00074.
30.
Zurück zum Zitat S. Aldhaheri, D. Alghazzawi, L. Cheng, B. Alzahrani, and A. Al-Barakati, “DeepDCA: Novel Network-Based Detection of IoT Attacks Using Artificial Immune System,” Applied Sciences, vol. 10, no. 6, p. 1909, Mar. 2020, https://doi.org/10.3390/app10061909. S. Aldhaheri, D. Alghazzawi, L. Cheng, B. Alzahrani, and A. Al-Barakati, “DeepDCA: Novel Network-Based Detection of IoT Attacks Using Artificial Immune System,” Applied Sciences, vol. 10, no. 6, p. 1909, Mar. 2020, https://​doi.​org/​10.​3390/​app10061909.
34.
Zurück zum Zitat P. Kumar, R. Kumar, G. P. Gupta, and R. Tripathi, “A Distributed framework for detecting DDoS attacks in smart contract-based Blockchain-IoT Systems by leveraging Fog computing,” Transactions on Emerging Telecommunications Technologies, vol. 32, no. 6, Sep. 2020, https://doi.org/10.1002/ett.4112. P. Kumar, R. Kumar, G. P. Gupta, and R. Tripathi, “A Distributed framework for detecting DDoS attacks in smart contract-based Blockchain-IoT Systems by leveraging Fog computing,” Transactions on Emerging Telecommunications Technologies, vol. 32, no. 6, Sep. 2020, https://​doi.​org/​10.​1002/​ett.​4112.
35.
Metadaten
Titel
AI-Empowered Blockchain Techniques Against Cybersecurity Context in IoT: A Survey
verfasst von
Anandakumar Haldorai
Babitha Lincy R
Suriya Murugan
Minu Balakrishnan
Copyright-Jahr
2024
DOI
https://doi.org/10.1007/978-3-031-53972-5_11

Neuer Inhalt